FreeBSD : apr -- multiple vunerabilities (dd943fbb-d0fe-11df-95a8-00219b0fc4d8)

medium Nessus Plugin ID 49770



The remote FreeBSD host is missing one or more security-related updates.


Secunia reports :

Multiple vulnerabilities have been reported in APR-util, which can be exploited by malicious people to cause a DoS (Denial of Service).

Two XML parsing vulnerabilities exist in the bundled version of expat.

An error within the 'apr_brigade_split_line()' function in buckets/apr_brigade.c can be exploited to cause high memory consumption.


Update the affected packages.

See Also

Plugin Details

Severity: Medium

ID: 49770

File Name: freebsd_pkg_dd943fbbd0fe11df95a800219b0fc4d8.nasl

Version: 1.11

Type: local

Published: 10/6/2010

Updated: 1/6/2021

Risk Information


Risk Factor: Medium

Score: 4.4


Risk Factor: Medium

Base Score: 5

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:apr0, p-cpe:/a:freebsd:freebsd:apr1, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 10/6/2010

Vulnerability Publication Date: 10/2/2010

Reference Information

CVE: CVE-2009-3560, CVE-2009-3720, CVE-2010-1623

BID: 43673

CWE: 119

Secunia: 41701